Bug 2045014 (CVE-2022-21708) - CVE-2022-21708 graphql-go: Denial of service via stack overflow panics
Summary: CVE-2022-21708 graphql-go: Denial of service via stack overflow panics
Keywords:
Status: NEW
Alias: CVE-2022-21708
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2045015
TreeView+ depends on / blocked
 
Reported: 2022-01-25 13:14 UTC by Pedro Sampaio
Modified: 2024-06-27 02:12 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:0735 0 None None None 2024-02-13 17:23:42 UTC
Red Hat Product Errata RHSA-2024:3885 0 None None None 2024-06-19 05:43:08 UTC
Red Hat Product Errata RHSA-2024:4006 0 None None None 2024-06-27 02:12:49 UTC

Description Pedro Sampaio 2022-01-25 13:14:40 UTC
graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version `v1.3.0`. The only known workaround for this issue is to disable the `graphql.MaxDepth` option from your schema which is not recommended.

References:

https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh
https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe

Comment 8 errata-xmlrpc 2024-02-13 17:23:41 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.14

Via RHSA-2024:0735 https://access.redhat.com/errata/RHSA-2024:0735

Comment 11 errata-xmlrpc 2024-06-19 05:43:08 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.13

Via RHSA-2024:3885 https://access.redhat.com/errata/RHSA-2024:3885

Comment 12 errata-xmlrpc 2024-06-27 02:12:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2024:4006 https://access.redhat.com/errata/RHSA-2024:4006


Note You need to log in before you can comment on or make changes to this bug.